{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:14:31Z","timestamp":1761718471799},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417499","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T19:11:24Z","timestamp":1459192284000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Unsupervised Detection of Web Trackers"],"prefix":"10.1109","author":[{"given":"Hassan","family":"Metwalley","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Traverso","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Privacy leakage vs. Protection measures: the growing disconnect","author":"krishnamurthy","year":"2011","journal-title":"IEEE W2SP"},{"journal-title":"Privacy Diffusion on the Web A Longitudinal Perspective","year":"2009","author":"krishnamurthy","key":"ref11"},{"journal-title":"Online Privacy - Reinforcing Trust and Confidence","year":"2011","author":"kroes","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2524748"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17172-2_8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23270"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23163"},{"key":"ref18","article-title":"Detecting and Defending Against Third-party Tracking on the Web","author":"roesner","year":"2012","journal-title":"USENIX NSDI"},{"journal-title":"Americans Reject Tailored Advertising and Three Activities That Enable It","year":"2009","author":"turow","key":"ref19"},{"key":"ref4","article-title":"A promising direction for web tracking countermeasures","author":"bau","year":"2013","journal-title":"IEEE W2SP"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342552"},{"key":"ref5","article-title":"Data Harvesting 2.0: from the Visible to the Invisible Web","author":"castelluccia","year":"2013","journal-title":"WEIS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54999-1_9"},{"article-title":"Protecting consumer privacy in an era of rapid change","year":"2012","author":"commission","key":"ref7"},{"journal-title":"Googles cookie matching protocol","year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","article-title":"rivacy and modern advertising","author":"hoofnagle","year":"2012","journal-title":"Amsterdam Privacy Conferene"},{"key":"ref20","article-title":"Host Fingerprinting and Tracking on the Web: Privacy and Security Implications","author":"yen","year":"2012","journal-title":"ISOC NDSS"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:22:23Z","timestamp":1602685343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417499","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}